TANDBERG Gatekeeper User Manual page 4

Tandberg gatekeeper user guide
Hide thumbs Also See for Gatekeeper:
Table of Contents

Advertisement

11.2.
Enterprise Gatekeepers ........................................................................................................ 48
11.3.
Dialing Public IP Addresses ................................................................................................... 49
11.4.
Neighbored Enterprises......................................................................................................... 49
11.5.
URI Dialing from within the Enterprise .................................................................................. 50
12.1.
About Third Party Call Control................................................................................................ 51
12.2.
Placing a Call......................................................................................................................... 51
12.3.
Transferring a Call................................................................................................................. 51
12.3.1.
Enabling call routed mode ..............................................................................................................51
12.3.2.
Enabling call transfer ......................................................................................................................52
12.4.
Disconnecting a Call.............................................................................................................. 52
13.1.
About Call Policy.................................................................................................................... 53
13.1.1.
Uploading the CPL script .................................................................................................................53
13.1.2.
Enabling use of the CPL script ........................................................................................................53
13.1.3.
Call Policy and Authentication ........................................................................................................53
13.1.4.
CPL Standard...................................................................................................................................53
13.2.
Making Decisions Based on Addresses................................................................................. 54
13.2.1.
address-switch.................................................................................................................................54
13.3.
CPL Script Actions ................................................................................................................. 55
13.3.1.
location ............................................................................................................................................55
13.3.2.
proxy.................................................................................................................................................56
13.3.3.
reject ................................................................................................................................................56
13.4.
Unsupported CPL Elements................................................................................................... 56
13.5.
CPL Examples ....................................................................................................................... 56
13.5.1.
Call screening of authenticated users............................................................................................56
13.5.2.
Call screening based on domain ....................................................................................................57
13.5.3.
Call redirection.................................................................................................................................57
13.5.4.
Call screening based on alias .........................................................................................................57
14.1.
About Logging ....................................................................................................................... 58
14.2.
Viewing the event log ............................................................................................................ 58
14.3.
Controlling what is Logged .................................................................................................... 58
14.3.1.
About Event levels ...........................................................................................................................58
14.3.2.
Setting the log level .........................................................................................................................58
14.4.
Event Log Format .................................................................................................................. 59
14.5.
Logged Events....................................................................................................................... 60
14.6.
Remote Logging .................................................................................................................... 64
14.6.1.
Enabling remote logging .................................................................................................................64
15.1.
About Software Upgrading..................................................................................................... 65
15.2.
Upgrading Using HTTP(S)....................................................................................................... 65
15.3.
Upgrading Using SCP/PSCP .................................................................................................. 66
16.1.
Status.................................................................................................................................... 68
16.1.1.
Listing all status information ..........................................................................................................68
16.1.2.
Listing all status commands ...........................................................................................................68
16.1.3.
Calls..................................................................................................................................................68
16.1.4.
Ethernet ...........................................................................................................................................68
16.1.5.
ExternalManager .............................................................................................................................69
16.1.6.
Feedback .........................................................................................................................................69
TANDBERG Gatekeeper User Guide
Page 4 of 105
51
53
58
65
68

Advertisement

Table of Contents
loading

Table of Contents